1. Lect Notes Comput Sci;P. Kocher,1996
2. P. Kocher, J. Jaffe and B. Jun. Differential Power Analysis: Leaking Secrets. In Proceedings of Crypto’ 99. A preliminary version is available online at http://www.cryptography.com/dpa/technical/index.html .
3. D. Chaum. Blind Signatures for Untraceable Payments. Advances in Cryptology: Proceedings of Crypto’ 82, Plenum Press, 1983, pp 199–203.
4. J. Daemen and V. Rijmen. Resistance against implementation attacks: A comparative study of the AES proposals. Proceedings of the Second AES Candidates Conference, Mar 1999, Rome, Italy.
5. W. Feller. An introduction to Probability Theory and its application, Vol. 1, Wiley Mathematical Statistics Series, 1950.